You are on page 1of 22

Computer Networks - ll

By : Sharon Jino
Class : Xll A
Table of Contents
1. Wireless / Mobile Computing
Technologies

2. Internet Working Terms & Concepts

3. Network Security Concepts

4. Computer Viruses
Communication Technologies for the Modern World

Communication technologies have revolutionized


the modern world by enabling instant and global
connectivity. The ongoing development and
responsible use will shape the future of society in
countless ways.
SMS , Chat and Video Conferencing

SMS (Short Message Service) : SMS is a text messaging service


that allows users to send short written messages, typically
limited to 160 characters.

Chat : Chat refers to real-time text-based communication


often facilitated through messaging apps or platforms. It
enables instant conversations between individuals or groups,
supporting multimedia elements like images and emoji.

Video Conferencing : Video conferencing involves real-time


audio and video communication between people in different
locations, typically over the internet.
Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) : VoIP is a


technology that enables voice communication and
multimedia sessions over the internet, allowing users
to make phone calls and conduct audio and video
conversations using IP networks rather than traditional
phone lines.

In summary, VoIP has revolutionized communication


by providing cost-effective, versatile, and globally
accessible voice and multimedia services.
Connecting Wirelessly to the Internet :
Wi-fi and WiMax
1. Wi-Fi (Wireless Fidelity) :

⦿ Wi-Fi, short for Wireless Fidelity, is a ubiquitous technology for wireless


communication.

⦿ It operates using radio waves, allowing devices like smartphones and laptops to
connect to the internet and local networks without physical cables.

⦿ Wi-Fi routers or access points create local hotspots that provide wireless
connectivity within a limited range, typically a few hundred feet.
2. WiMax (Worldwide Interoperability for
Microwave Access) :

⦿ WiMax, short for Worldwide Interoperability for Microwave Access, is a


wireless broadband technology with a wider coverage area than Wi-Fi.

⦿ It offers high-speed internet access over longer distances, often spanning


several miles, making it suitable for metropolitan and rural deployments.

⦿ WiMax has been used by internet service providers to bridge the digital
divide by offering broadband connectivity in areas with limited access to
wired internet infrastructure.
Internetworking Terms and Concepts

Internetworking involves connecting different networks to


enable data exchange. Key terms include routers (network
traffic directors), protocols (communication rules), IP
addresses (device identifiers), subnets (network segments),
firewalls (security barriers), gateways (network bridges), DNS
(address translation), LAN (local network), WAN (wide
network), and topology (network structure). These concepts
underpin modern internet connectivity.
Web Addresses and Web Pages

Web Addresses (URLs) : Web addresses, or URLs (Uniform


Resource Locators), are text-based identifiers that specify the
location of resources on the internet.

Web pages : Web pages are digital documents displayed in


web browsers. They contain text, images, videos, links, and
interactive elements.
Domain Name System (DNS)

The Domain Name System (DNS) is like the internet's


phone book. It translates human-readable domain names
(e.g., www.example.com) into numeric IP addresses that
computers use to locate and connect to websites and
resources. DNS plays a crucial role in making web
navigation user-friendly by eliminating the need for users
to remember complex IP addresses and instead use easy-
to-remember domain names to access online content.
Web Hosting and Web 2.0 / 3.0

Web Hosting : Web hosting is a service that provides


individuals and organizations with the means to make their
websites accessible on the internet.

Web 2.0 / 3.0 : Web 2.0 refers to a shift in web


development and usage, emphasizing user-generated
content, collaboration, and interactive web applications.
Web 3.0, often referred to as the Semantic Web, is a
concept of a more intelligent and interconnected web that
uses artificial intelligence and data to provide more
context-aware and personalized experiences.
XML , HTML , DHTML

XML (Extensible Markup Language) : XML is a versatile markup


language used for structuring and encoding data in a format that is
both human-readable and machine-readable.

HTML (Hypertext Markup Language) : HTML is the standard markup


language used for creating web pages.

DHTML (Dynamic Hypertext Markup Language) : DHTML is a


combination of HTML, CSS (Cascading Style Sheets), and JavaScript.
Web Scripting

Web Scripting : Web scripting refers to the use of


scripting languages like JavaScript, Python, or PHP to
add functionality and interactivity to web pages.
Scripting enables dynamic content updates, user
interactions, and the manipulation of webpage
elements in real-time. It plays a fundamental role in
modern web development, enhancing user experiences
and enabling web applications to respond to user input
and data.
Comparing Client Side and Server Side Scripting

1. Client-Side Scripting :
⦿ Executes in the Browser : Client-side scripting, such as
JavaScript, runs on the user's web browser.
⦿ Enhanced User Interactivity : It enables dynamic and
interactive features directly on the user's device.

2. Server-Side Scripting :
⦿ Executes on the Server : Server-side scripting, using
languages like PHP, Python, or Ruby , runs on the web server.
⦿ Enhanced Security : It is more secure for handling sensitive
data and logic as the code is not exposed to users.
Network Security Concepts

Network security concepts involve safeguarding computer networks


from unauthorized access and cyber threats. Key elements include
firewalls, encryption, authentication, access control, and antivirus
software.

➡ Network security aims to maintain the confidentiality, integrity, and


availability of data within a network, protecting it from unauthorized
access, data breaches, and cyber attacks.

➡ Regular updates and patch management are crucial to address


vulnerabilities and ensure that network security measures remain
effective against evolving threats.

.
Related Terms

Cookies are small pieces of data stored on a user's web browser


by websites they visit. They serve various purposes, including
tracking user sessions, personalizing website experiences, and
remembering login credentials.

Hackers are individuals skilled in computer programming and


network security, often using their expertise for ethical
purposes, such as improving cyber security or finding
vulnerabilities.

Crackers, on the other hand, use their skills maliciously to gain


unauthorized access to computer systems, steal data, or engage
in other illicit activities. They are considered cybercriminals.
Cyber Crimes

Cybercrimes are illegal activities conducted online,


encompassing various forms of cyber attacks, fraud,
identity theft, and digital vandalism. They pose
significant threats to individuals, organizations, and
society as a whole, and law enforcement agencies work
to combat and prevent them. Cybercrimes often
involve exploiting vulnerabilities in computer systems,
networks, or individuals to gain unauthorized access,
steal sensitive information, or disrupt online
operations.
IPR Issues

Intellectual Property Rights (IPR) issues pertain to legal


protections for creations of the mind, such as inventions,
artistic works, and brand identities. These issues revolve
around copyright, trademarks, patents, and trade secrets. IPR
safeguards innovation and creativity, but it also raises debates
on issues like copyright infringement, patent trolling, and
balancing public access with creator rights. Effective IPR
enforcement is crucial for fostering innovation while ensuring
fair compensation for creators and inventors.
Computer Viruses

Computer viruses are malicious software programs designed to


replicate and spread to other computers, causing harm. They can
corrupt or delete files, steal sensitive data, or disrupt computer
operations. Protecting against viruses requires up-to-date antivirus
software and cautious online behavior to prevent infections. These
viruses can cause a wide range of harm, from corrupting data and
stealing personal information to disrupting computer operations.
Preventative measures, such as installing antivirus software, regularly
updating systems, and exercising caution while downloading files or
clicking on links, are essential to protect against these digital threats.
Trojan Horse , Worms , Spam
Trojan Horse : A Trojan Horse, or simply a Trojan, is malicious software
disguised as legitimate or helpful, enticing users to install it. Once
installed, it can provide unauthorized access to a computer, steal
sensitive information, or perform other harmful actions without the
user's knowledge.

Worms : Worms are self-replicating malware that spread across


networks and systems by exploiting vulnerabilities. Unlike viruses, they
don't need a host file to attach to and can independently move from
one computer to another.

Spam : Spam refers to unsolicited and often irrelevant or deceptive


emails or messages sent in bulk. Typically used for advertising or
phishing, spam can overwhelm email inboxes, waste time, and pose
security risks if users interact with malicious content.
Network Security Threats

Network security threats are risks to the confidentiality, integrity,


and availability of data and resources in computer networks. They
include malware (e.g., viruses, ransom ware), phishing attacks,
hacking, denial of service (DOS), insider threats, and vulnerabilities
that, if exploited, can compromise network security. Protecting
against these threats involves robust security measures, regular
updates, and user awareness.

You might also like